US20150178486A1 - Authentication Frequency and Challenge Type Based on Environmental and Physiological Properties - Google Patents
Authentication Frequency and Challenge Type Based on Environmental and Physiological Properties Download PDFInfo
- Publication number
- US20150178486A1 US20150178486A1 US14/642,028 US201514642028A US2015178486A1 US 20150178486 A1 US20150178486 A1 US 20150178486A1 US 201514642028 A US201514642028 A US 201514642028A US 2015178486 A1 US2015178486 A1 US 2015178486A1
- Authority
- US
- United States
- Prior art keywords
- time
- measurement
- authentication challenge
- user
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000007613 environmental effect Effects 0.000 title claims abstract description 29
- 230000001766 physiological effect Effects 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 claims abstract description 16
- 230000036772 blood pressure Effects 0.000 claims abstract description 6
- 238000005259 measurement Methods 0.000 claims description 22
- 230000007177 brain activity Effects 0.000 claims description 5
- 230000029058 respiratory gaseous exchange Effects 0.000 claims description 5
- 230000036760 body temperature Effects 0.000 claims description 4
- 239000012080 ambient air Substances 0.000 claims description 2
- 230000007423 decrease Effects 0.000 claims 3
- 230000000694 effects Effects 0.000 abstract 1
- 230000004044 response Effects 0.000 description 3
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 208000010513 Stupor Diseases 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 210000001061 forehead Anatomy 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Definitions
- the present invention relates to computer security in general, and, more particularly, to authentication.
- a data-processing system e.g., a wireless telecommunications terminal such as a cellular phone or a smart phone, a personal computer, a server, etc.
- a data-processing system e.g., a wireless telecommunications terminal such as a cellular phone or a smart phone, a personal computer, a server, etc.
- a user is presented with an authentication challenge, and the user must supply a valid response to the challenge. Examples of different types of authentication challenges include:
- the present invention enables authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) to be determined based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both.
- one or more environmental properties e.g., ambient noise level, ambient luminosity, temperature, etc.
- physiological properties of a user e.g., heart rate, blood pressure, etc.
- both current and historical environmental and physiological properties can be used in these determinations.
- the present invention is advantageous in that it enables authentication frequency to be increased (i.e., less time between re-authentication challenges, which corresponds to tighter security) and the challenge type to be stronger (i.e., more secure) in situations where it is more likely that a malicious user has gained access to a data-processing system.
- a user's wireless telecommunications terminal e.g., a cell phone, a personal digital assistant [PDA], etc.
- PDA personal digital assistant
- the authentication frequency and challenge type for an office worker's personal computer might be set for a higher level of security when the office is dark.
- authentication frequency and challenge type for a wireless telecommunications terminal might be set for a higher level of security when one or more physiological properties of its user differ substantially from their normal prior ranges, or when the physiological properties indicate that the user might be nervous, or when the environment of the terminal at a particular day and time (say, a weekday morning) differs substantially from the norm.
- the present invention enables the selection of an authentication challenge type that is especially well-suited to a particular situation.
- a voice recognition challenge might be issued when it is dark, as opposed to a retina scan challenge (because it's dark), or a fingerprint recognition challenge (as it might be difficult for the user to find the fingerprint sensor in the dark).
- a challenge/response via a video display and keyboard might be more appropriate than a voice recognition challenge in a noisy environment.
- a speaker-independent challenge/response via a speaker and microphone might be more suitable than a display/keyboard challenge (as it is likely difficult for the user to type via keyboard while exercising) or a voice recognition challenge (as the error rate might be high when a user is breathing heavily).
- the illustrative embodiment comprises: presenting a first authentication challenge at time t 1 ; and presenting a second authentication challenge at time t 2 ; wherein the magnitude of t 2 -t 1 is based on an environmental property at one or more instants in time interval [t 1 , t 2 ].
- FIG. 1 depicts the salient elements of data-processing system 100 , in accordance with the illustrative embodiment of the present invention.
- FIG. 2 depicts the salient elements of environmental sensor array 160 , as shown in FIG. 1 , in accordance with the illustrative embodiment of the present invention.
- FIG. 3 depicts the salient elements of physiological sensor array 170 , as shown in FIG. 1 , in accordance with the illustrative embodiment of the present invention.
- FIG. 4 depicts a flowchart of a method for determining re-authentication challenge frequency and type, in accordance with the illustrative embodiment of the present invention.
- calendrical time is defined as indicative of one or more of the following:
- FIG. 1 depicts the salient elements of data-processing system 100 , in accordance with the illustrative embodiment of the present invention.
- data-processing system 100 comprises transceiver 110 , memory 120 , clock 130 , input devices 140 - 1 through 140 -N, where N is a positive integer, output devices 150 - 1 through 150 -M, where M is a positive integer, environmental sensor array 160 , and physiological sensor array 170 , and processor 180 , interconnected as shown.
- Transceiver 110 is capable of receiving external signals (e.g., via a wired network, via a wireless network, etc.) and forwarding information encoded in these signals to processor 180 , and of receiving information from processor 180 and transmitting signals that encode this information (e.g., via a wired network, via a wireless network, etc.), in well-known fashion.
- external signals e.g., via a wired network, via a wireless network, etc.
- Transceiver 110 is capable of receiving external signals (e.g., via a wired network, via a wireless network, etc.) and forwarding information encoded in these signals to processor 180 , and of receiving information from processor 180 and transmitting signals that encode this information (e.g., via a wired network, via a wireless network, etc.), in well-known fashion.
- Memory 120 is capable of storing data, program source code, and executable instructions, as is well-known in the art, and might be any combination of random-access memory (RAM), flash memory, disk drive, etc. In accordance with the illustrative embodiment, memory 120 is capable of storing historical environmental and physiological data.
- Clock 130 is capable of transmitting the current time, date, and day of the week to processor 180 , in well-known fashion.
- Input devices 140 - 1 through 140 -N are capable of receiving input from a user and of forwarding the input to processor 180 , in well-known fashion.
- Examples of input devices 140 - 1 through 140 -N might include a numeric keypad, an alphanumeric keyboard, a fingerprint sensor, a microphone, a magnetic card reader, and so forth.
- Output devices 150 - 1 through 150 -M are capable of receiving information, including authentication challenges, from processor 180 , and of outputting the information to a user, in well-known fashion.
- Examples of output devices 150 - 1 through 150 -M might include a video display, a speaker, a vibration mechanism, and so forth.
- Environmental sensor array 160 is capable of receiving information concerning environmental properties, as is described in detail below and with respect to FIG. 2 , and of forwarding this information to processor 180 , in well-known fashion.
- Physiological sensor array 170 is capable of receiving information concerning a user's physiological properties, as is described in detail below and with respect to FIG. 3 , and of forwarding this information to processor 180 , in well-known fashion.
- Processor 180 is a general-purpose processor that is capable of reading data from and writing data into memory 120 , of executing instructions stored in memory 120 , and of executing the tasks described below and with respect to FIG. 4 .
- processor 180 might be a special-purpose processor, rather than a general-purpose processor.
- FIG. 2 depicts the salient elements of environmental sensor array 160 , in accordance with the illustrative embodiment of the present invention.
- Environmental sensor array 160 comprises sound level meter 210 , photometer 220 , thermometer 230 , hygrometer 240 , and barometer 250 .
- Sound level meter 210 measures ambient sound intensity, in well-known fashion, and transmits its measurements to processor 180 .
- Photometer 220 measures ambient light intensity, in well-known fashion, and transmits its measurements to processor 180 .
- Thermometer 230 measures ambient temperature, in well-known fashion, and transmits its measurements to processor 180 .
- Hygrometer 240 measures ambient humidity, in well-known fashion, and transmits its measurements to processor 180 .
- Barometer 250 measures ambient air pressure, in well-known fashion, and transmits its measurements to processor 180 .
- FIG. 3 depicts the salient elements of physiological sensor array 170 , in accordance with the illustrative embodiment of the present invention.
- An exemplary group of sensors 170 can include heart rate monitor 310 , blood pressure monitor 320 , respiration rate monitor 330 , body temperature monitor 340 , and brain activity monitor 350 .
- some or all of the monitors 310 , 320 , 330 , 340 , 350 might receive input from the user via one or more sensors that are coupled to the user's body (e.g., via the user's forehead, via one of the user's fingers, etc.) and that transmit data to data-processing system 100 , either wirelessly or via a wire.
- data-processing system 100 is a handheld telecommunications terminal
- some or all of monitors 210 through 250 might receive input from the user via one or more sensors that are located on the surface of the terminal, and that receive physiological signals from the user when the user is holding the terminal.
- physiological sensor array might be capable of receiving physiological signals from one or more other persons, either in addition to or instead of the user of data-processing system 100 .
- Heart rate monitor 210 measures a user's heart rate, in well-known fashion, and transmits its measurements to processor 180 .
- Blood pressure monitor 220 measures a user's blood pressure, in well-known fashion, and transmits its measurements to processor 180 .
- Respiration rate monitor 230 measures a user's respiration rate, in well-known fashion, and transmits its measurements to processor 180 .
- Body temperature monitor 240 measures a user's body temperature, in well-known fashion, and transmits its measurements to processor 180 .
- Brain activity monitor 250 is a device such as an electroencephalograph, an electromyograph, etc. that obtains one or more measurements of a user's brain activity and transmits its measurements to processor 180 .
- brain activity monitory 250 might be capable of indicating such conditions as when a user is engaged in deep thought, when a user is engaged in vigorous exercise, when a user is in a stupor, when a user is asleep, and so forth.
- physiological sensor array 170 might comprise other kinds of physiological monitors (e.g., an electrocardiograph, a pulse oximeter, etc.) and/or collect other physiological properties (e.g., heart beat, pulse regularity, skin color, etc.) in addition to, or instead of, those depicted in FIG. 3 and described above, and it will be clear to those skilled in the art, after reading this disclosure, how to make and use such embodiments of the present invention.
- physiological monitors e.g., an electrocardiograph, a pulse oximeter, etc.
- other physiological properties e.g., heart beat, pulse regularity, skin color, etc.
- FIG. 4 depicts a flowchart of a method for determining re-authentication challenge frequency and type, in accordance with the illustrative embodiment of the present invention.
- the tasks of FIG. 4 are performed by data-processing system 100 .
- one or more tasks of FIG. 4 might instead be performed by another entity (e.g., an authentication server, etc.) and the result transmitted to transceiver 110 of data-processing system 100 .
- physiological properties of the user of data-processing system 100 are obtained from sensor array 170 , in well-known fashion.
- the input capabilities of data-processing system 100 are determined.
- data-processing system 100 merely has to check which of input devices 140 - 1 through 140 -N are currently enabled and functional; while in some other embodiments of the present invention, an authentication server or some other entity might transmit a message to data-processing system 100 that explicitly asks for its input capabilities; while in yet some other embodiments, an authentication server or some other entity might transmit a message to data-processing system 100 that asks for its manufacturer and model (e.g., Apple iPhone , etc.), and then consult a database to determine the input capabilities of data-processing system 100 (under the assumption that all of data-processing system 100 's capabilities are currently enabled and functional).
- manufacturer and model e.g., Apple iPhone , etc.
- an authentication challenge type T and time A between challenges are determined based on:
- an authentication challenge type might comprise a plurality of successive challenges, rather than a single challenge, thereby enabling even “stronger” authentication challenges.
- a challenge type determined at task 440 might be “fingerprint recognition, followed by iris scan.”
- the current day and time might be obtained from clock 130 , or might be obtained from an external source via transceiver 110 .
- historical environmental and physiological property data are stored in memory 120
- these data might be stored in an external database and accessed by data-processing system 100 via transceiver 110 .
- the collection, storing, and organization of these historical data might be performed by data-processing system 100 itself, while in some other embodiments of the present invention some other entity might perform these functions.
- physiological sensor array 170 is capable of receiving signals from one or more other persons in addition to the current user of data-processing system 100
- the physiological properties of these other persons might also be considered in the determination of task 440 .
- physiological sensor array 170 is capable of receiving signals from one or more other persons instead of the current user of data-processing system 100
- the physiological properties of at least one of these other persons will be considered in lieu of physiological properties of the current user of data-processing system 100 .
- an authentication challenge of type T is generated, in well-known fashion.
- the authentication challenge generated at task 450 is presented to the user of data-processing system 100 at a time in accordance with A, in well-known fashion. After task 460 , the method of FIG. 4 terminates.
Abstract
Description
- moon This application is a divisional of U.S. patent application Ser. No. 12/241,584, filed Sep. 30, 2008, which is a continuation-in-part of U.S. patent application Ser. No. 11/942,670, filed 19 Nov. 2007, now U.S. Pat. No. 8,918,079, issued on Dec. 23, 2014, which are incorporated herein by reference in their entirety.
- The present invention relates to computer security in general, and, more particularly, to authentication.
- In some instances it is desirable for security reasons to require that the user of a data-processing system (e.g., a wireless telecommunications terminal such as a cellular phone or a smart phone, a personal computer, a server, etc.) be authenticated before the user is permitted to access an application or resource of the data-processing system. Typically a user is presented with an authentication challenge, and the user must supply a valid response to the challenge. Examples of different types of authentication challenges include:
-
- requiring a user to furnish his or her username and password;
- requiring a user to consult an electronic token device or a list of numbers in order to furnish a one-time password;
- requiring a user to answer a pre-arranged secret question (e.g., “What is your mother's maiden name?”, “What was your first telephone number?”, etc.); and
- biometrics (e.g., fingerprint recognition, voice recognition, retinal or iris scan, etc.).
Furthermore, in some instances the user ofwireless telecommunications terminal 110 might be periodically challenged (i.e., the user is periodically re-authenticated) for greater security.
- The present invention enables authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) to be determined based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. In accordance with the illustrative embodiment, both current and historical environmental and physiological properties can be used in these determinations.
- The present invention is advantageous in that it enables authentication frequency to be increased (i.e., less time between re-authentication challenges, which corresponds to tighter security) and the challenge type to be stronger (i.e., more secure) in situations where it is more likely that a malicious user has gained access to a data-processing system. For example, it might be more likely that a user's wireless telecommunications terminal (e.g., a cell phone, a personal digital assistant [PDA], etc.) is left behind or stolen in an environment with a lot of ambient noise (the theory being that the environment is a public place with a lot of people around). As another example, the authentication frequency and challenge type for an office worker's personal computer might be set for a higher level of security when the office is dark. As yet further examples, authentication frequency and challenge type for a wireless telecommunications terminal might be set for a higher level of security when one or more physiological properties of its user differ substantially from their normal prior ranges, or when the physiological properties indicate that the user might be nervous, or when the environment of the terminal at a particular day and time (say, a weekday morning) differs substantially from the norm.
- In addition, the present invention enables the selection of an authentication challenge type that is especially well-suited to a particular situation. For example, a voice recognition challenge might be issued when it is dark, as opposed to a retina scan challenge (because it's dark), or a fingerprint recognition challenge (as it might be difficult for the user to find the fingerprint sensor in the dark). As another example, a challenge/response via a video display and keyboard might be more appropriate than a voice recognition challenge in a noisy environment. As yet another example, when physiological properties of a user suggest that the user is engaged in vigorous exercise, a speaker-independent challenge/response via a speaker and microphone might be more suitable than a display/keyboard challenge (as it is likely difficult for the user to type via keyboard while exercising) or a voice recognition challenge (as the error rate might be high when a user is breathing heavily).
- The illustrative embodiment comprises: presenting a first authentication challenge at time t1; and presenting a second authentication challenge at time t2; wherein the magnitude of t2-t1 is based on an environmental property at one or more instants in time interval [t1, t2].
-
FIG. 1 depicts the salient elements of data-processing system 100, in accordance with the illustrative embodiment of the present invention. -
FIG. 2 depicts the salient elements ofenvironmental sensor array 160, as shown inFIG. 1 , in accordance with the illustrative embodiment of the present invention. -
FIG. 3 depicts the salient elements ofphysiological sensor array 170, as shown inFIG. 1 , in accordance with the illustrative embodiment of the present invention. -
FIG. 4 depicts a flowchart of a method for determining re-authentication challenge frequency and type, in accordance with the illustrative embodiment of the present invention. - For the purposes of the specification and claims, the term “calendrical time” is defined as indicative of one or more of the following:
-
- (i) a time (e.g., 16:23:58, etc.),
- (ii) one or more temporal designations (e.g., Tuesday, November, etc.),
- (iii) one or more events (e.g., Thanksgiving, John's birthday, etc.), and
- (iv) a time span (e.g., 8:00 PM to 9:00 PM, etc.).
-
FIG. 1 depicts the salient elements of data-processing system 100, in accordance with the illustrative embodiment of the present invention. As shown inFIG. 1 , data-processing system 100 comprisestransceiver 110,memory 120,clock 130, input devices 140-1 through 140-N, where N is a positive integer, output devices 150-1 through 150-M, where M is a positive integer,environmental sensor array 160, andphysiological sensor array 170, andprocessor 180, interconnected as shown. - Transceiver 110 is capable of receiving external signals (e.g., via a wired network, via a wireless network, etc.) and forwarding information encoded in these signals to
processor 180, and of receiving information fromprocessor 180 and transmitting signals that encode this information (e.g., via a wired network, via a wireless network, etc.), in well-known fashion. -
Memory 120 is capable of storing data, program source code, and executable instructions, as is well-known in the art, and might be any combination of random-access memory (RAM), flash memory, disk drive, etc. In accordance with the illustrative embodiment,memory 120 is capable of storing historical environmental and physiological data. -
Clock 130 is capable of transmitting the current time, date, and day of the week to processor 180, in well-known fashion. - Input devices 140-1 through 140-N are capable of receiving input from a user and of forwarding the input to
processor 180, in well-known fashion. Examples of input devices 140-1 through 140-N might include a numeric keypad, an alphanumeric keyboard, a fingerprint sensor, a microphone, a magnetic card reader, and so forth. - Output devices 150-1 through 150-M are capable of receiving information, including authentication challenges, from
processor 180, and of outputting the information to a user, in well-known fashion. Examples of output devices 150-1 through 150-M might include a video display, a speaker, a vibration mechanism, and so forth. -
Environmental sensor array 160 is capable of receiving information concerning environmental properties, as is described in detail below and with respect toFIG. 2 , and of forwarding this information toprocessor 180, in well-known fashion. -
Physiological sensor array 170 is capable of receiving information concerning a user's physiological properties, as is described in detail below and with respect toFIG. 3 , and of forwarding this information toprocessor 180, in well-known fashion. -
Processor 180 is a general-purpose processor that is capable of reading data from and writing data intomemory 120, of executing instructions stored inmemory 120, and of executing the tasks described below and with respect toFIG. 4 . As will be appreciated by those skilled in the art, in some embodiments of thepresent invention processor 180 might be a special-purpose processor, rather than a general-purpose processor. -
FIG. 2 depicts the salient elements ofenvironmental sensor array 160, in accordance with the illustrative embodiment of the present invention.Environmental sensor array 160 comprisessound level meter 210,photometer 220,thermometer 230,hygrometer 240, andbarometer 250. -
Sound level meter 210 measures ambient sound intensity, in well-known fashion, and transmits its measurements toprocessor 180. -
Photometer 220 measures ambient light intensity, in well-known fashion, and transmits its measurements toprocessor 180. -
Thermometer 230 measures ambient temperature, in well-known fashion, and transmits its measurements toprocessor 180. -
Hygrometer 240 measures ambient humidity, in well-known fashion, and transmits its measurements toprocessor 180. - Barometer 250 measures ambient air pressure, in well-known fashion, and transmits its measurements to
processor 180. -
FIG. 3 depicts the salient elements ofphysiological sensor array 170, in accordance with the illustrative embodiment of the present invention. An exemplary group ofsensors 170, such as a physiological sensor array, can includeheart rate monitor 310,blood pressure monitor 320,respiration rate monitor 330,body temperature monitor 340, andbrain activity monitor 350. As will be appreciated by those skilled in the art, in some embodiments of the present invention, some or all of themonitors processing system 100, either wirelessly or via a wire. Alternatively, in some other embodiments of the present invention in which data-processing system 100 is a handheld telecommunications terminal, some or all ofmonitors 210 through 250 might receive input from the user via one or more sensors that are located on the surface of the terminal, and that receive physiological signals from the user when the user is holding the terminal. Moreover, as will be appreciated by those skilled in the art, in some other embodiments of the present invention physiological sensor array might be capable of receiving physiological signals from one or more other persons, either in addition to or instead of the user of data-processing system 100. - Heart rate monitor 210 measures a user's heart rate, in well-known fashion, and transmits its measurements to
processor 180. - Blood pressure monitor 220 measures a user's blood pressure, in well-known fashion, and transmits its measurements to
processor 180. - Respiration rate monitor 230 measures a user's respiration rate, in well-known fashion, and transmits its measurements to
processor 180. - Body temperature monitor 240 measures a user's body temperature, in well-known fashion, and transmits its measurements to
processor 180. - Brain activity monitor 250 is a device such as an electroencephalograph, an electromyograph, etc. that obtains one or more measurements of a user's brain activity and transmits its measurements to
processor 180. As will be appreciated by those skilled in the art, in some embodiments of the present inventionbrain activity monitory 250 might be capable of indicating such conditions as when a user is engaged in deep thought, when a user is engaged in vigorous exercise, when a user is in a stupor, when a user is asleep, and so forth. - As will be appreciated by those skilled in the art, in some embodiments of the present invention
physiological sensor array 170 might comprise other kinds of physiological monitors (e.g., an electrocardiograph, a pulse oximeter, etc.) and/or collect other physiological properties (e.g., heart beat, pulse regularity, skin color, etc.) in addition to, or instead of, those depicted inFIG. 3 and described above, and it will be clear to those skilled in the art, after reading this disclosure, how to make and use such embodiments of the present invention. -
FIG. 4 depicts a flowchart of a method for determining re-authentication challenge frequency and type, in accordance with the illustrative embodiment of the present invention. In accordance with the illustrative embodiment, the tasks ofFIG. 4 are performed by data-processing system 100. As will be appreciated by those skilled in the art, however, in some other embodiments of the present invention, one or more tasks ofFIG. 4 , such as the determination of the challenge frequency and type attask 440, might instead be performed by another entity (e.g., an authentication server, etc.) and the result transmitted totransceiver 110 of data-processing system 100. - At
task 410, environmental properties at data-processing system 100 are obtained fromsensor array 160, in well-known fashion. - At
task 420, physiological properties of the user of data-processing system 100 are obtained fromsensor array 170, in well-known fashion. - At
task 430, the input capabilities of data-processing system 100 are determined. As will be appreciated by those skilled in the art, in embodiments of the present invention in whichtask 430 is performed by data-processing system 100 itself, data-processing system 100 merely has to check which of input devices 140-1 through 140-N are currently enabled and functional; while in some other embodiments of the present invention, an authentication server or some other entity might transmit a message to data-processing system 100 that explicitly asks for its input capabilities; while in yet some other embodiments, an authentication server or some other entity might transmit a message to data-processing system 100 that asks for its manufacturer and model (e.g., Apple iPhone , etc.), and then consult a database to determine the input capabilities of data-processing system 100 (under the assumption that all of data-processing system 100's capabilities are currently enabled and functional). - At
task 440, an authentication challenge type T and time A between challenges are determined based on: -
- the current environmental properties at data-
processing system 100, - environmental properties at data-
processing system 100 since the last authentication challenge at data-processing system 100, - historical environmental properties associated with data-
processing system 100, - historical environmental properties associated with data-
processing system 100 and the current calendrical time, - the current physiological properties of the current user of data-
processing system 100, - physiological properties of data-
processing system 100's user since the last authentication challenge at data-processing system 100, - historical physiological properties associated with data-
processing system 100, - historical physiological properties associated with data-
processing system 100 and the current calendrical time, and - the input capabilities of data-
processing system 100.
- the current environmental properties at data-
- As will be appreciated by those skilled in the art, in some embodiments of the present invention, an authentication challenge type might comprise a plurality of successive challenges, rather than a single challenge, thereby enabling even “stronger” authentication challenges. For example, a challenge type determined at
task 440 might be “fingerprint recognition, followed by iris scan.” - As will further be appreciated by those skilled in the art, for embodiments of the present invention in which
task 440 is performed by data-processing system 100, the current day and time might be obtained fromclock 130, or might be obtained from an external source viatransceiver 110. Moreover, although in the illustrative embodiment historical environmental and physiological property data are stored inmemory 120, in some other embodiments of the present invention these data might be stored in an external database and accessed by data-processing system 100 viatransceiver 110. As will further be appreciated by those skilled in the art, in some embodiments of the present invention the collection, storing, and organization of these historical data might be performed by data-processing system 100 itself, while in some other embodiments of the present invention some other entity might perform these functions. - As will further be appreciated in the art, in some embodiments of the present invention in which
physiological sensor array 170 is capable of receiving signals from one or more other persons in addition to the current user of data-processing system 100, the physiological properties of these other persons might also be considered in the determination oftask 440. Similarly, in some other embodiments of the present invention in whichphysiological sensor array 170 is capable of receiving signals from one or more other persons instead of the current user of data-processing system 100, the physiological properties of at least one of these other persons will be considered in lieu of physiological properties of the current user of data-processing system 100. - At
task 450, an authentication challenge of type T is generated, in well-known fashion. - At
task 460, the authentication challenge generated attask 450 is presented to the user of data-processing system 100 at a time in accordance with A, in well-known fashion. Aftertask 460, the method ofFIG. 4 terminates. - It is to be understood that the disclosure teaches just one example of the illustrative embodiment and that many variations of the invention can easily be devised by those skilled in the art after reading this disclosure and that the scope of the present invention is to be determined by the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/642,028 US9262609B2 (en) | 2007-11-19 | 2015-03-09 | Authentication frequency and challenge type based on environmental and physiological properties |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/942,670 US8918079B2 (en) | 2007-11-19 | 2007-11-19 | Determining authentication challenge timing and type |
US12/241,584 US8978117B2 (en) | 2007-11-19 | 2008-09-30 | Authentication frequency and challenge type based on environmental and physiological properties |
US14/642,028 US9262609B2 (en) | 2007-11-19 | 2015-03-09 | Authentication frequency and challenge type based on environmental and physiological properties |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/241,584 Division US8978117B2 (en) | 2007-11-19 | 2008-09-30 | Authentication frequency and challenge type based on environmental and physiological properties |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150178486A1 true US20150178486A1 (en) | 2015-06-25 |
US9262609B2 US9262609B2 (en) | 2016-02-16 |
Family
ID=40643391
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/241,584 Active 2029-11-20 US8978117B2 (en) | 2007-11-19 | 2008-09-30 | Authentication frequency and challenge type based on environmental and physiological properties |
US14/642,028 Expired - Fee Related US9262609B2 (en) | 2007-11-19 | 2015-03-09 | Authentication frequency and challenge type based on environmental and physiological properties |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/241,584 Active 2029-11-20 US8978117B2 (en) | 2007-11-19 | 2008-09-30 | Authentication frequency and challenge type based on environmental and physiological properties |
Country Status (1)
Country | Link |
---|---|
US (2) | US8978117B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180232511A1 (en) * | 2016-06-07 | 2018-08-16 | Vocalzoom Systems Ltd. | System, device, and method of voice-based user authentication utilizing a challenge |
CN108830064A (en) * | 2018-06-06 | 2018-11-16 | Oppo(重庆)智能科技有限公司 | The control method of electronic device and electronic device |
WO2022046627A1 (en) * | 2020-08-27 | 2022-03-03 | Cisco Technology, Inc. | Determining session duration for device authentication |
US11314896B2 (en) * | 2017-07-26 | 2022-04-26 | Forcepoint, LLC | Gracefully handling endpoint feedback when starting to monitor |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0621189D0 (en) * | 2006-10-25 | 2006-12-06 | Payfont Ltd | Secure authentication and payment system |
US8950001B2 (en) * | 2007-08-01 | 2015-02-03 | Avaya Inc. | Continual peer authentication |
US8646039B2 (en) * | 2007-08-01 | 2014-02-04 | Avaya Inc. | Automated peer authentication |
US20110167477A1 (en) * | 2010-01-07 | 2011-07-07 | Nicola Piccirillo | Method and apparatus for providing controlled access to a computer system/facility resource for remote equipment monitoring and diagnostics |
US10949514B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | Device, system, and method of differentiating among users based on detection of hardware components |
US20190158535A1 (en) * | 2017-11-21 | 2019-05-23 | Biocatch Ltd. | Device, System, and Method of Detecting Vishing Attacks |
US10917431B2 (en) | 2010-11-29 | 2021-02-09 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
US11223619B2 (en) | 2010-11-29 | 2022-01-11 | Biocatch Ltd. | Device, system, and method of user authentication based on user-specific characteristics of task performance |
US10621585B2 (en) | 2010-11-29 | 2020-04-14 | Biocatch Ltd. | Contextual mapping of web-pages, and generation of fraud-relatedness score-values |
US11210674B2 (en) | 2010-11-29 | 2021-12-28 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US10069837B2 (en) | 2015-07-09 | 2018-09-04 | Biocatch Ltd. | Detection of proxy server |
US10728761B2 (en) | 2010-11-29 | 2020-07-28 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
US10834590B2 (en) | 2010-11-29 | 2020-11-10 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
CN102662554B (en) * | 2012-01-09 | 2015-06-24 | 联想(北京)有限公司 | Information processing apparatus and code input mode switching method thereof |
US9305153B1 (en) * | 2012-06-29 | 2016-04-05 | Emc Corporation | User authentication |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US9396320B2 (en) | 2013-03-22 | 2016-07-19 | Nok Nok Labs, Inc. | System and method for non-intrusive, privacy-preserving authentication |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
WO2014176539A1 (en) * | 2013-04-26 | 2014-10-30 | Interdigital Patent Holdings, Inc. | Multi-factor authentication to achieve required authentication assurance level |
US9961077B2 (en) | 2013-05-30 | 2018-05-01 | Nok Nok Labs, Inc. | System and method for biometric authentication with device attestation |
US10057289B2 (en) | 2013-08-12 | 2018-08-21 | International Business Machines Corporation | Adjusting multi-factor authentication using context and pre-registration of objects |
CN103761465A (en) * | 2014-02-14 | 2014-04-30 | 上海云亨科技有限公司 | Method and device for identity authentication |
SG10201902107VA (en) * | 2014-04-07 | 2019-04-29 | Eyeverify Inc | Bio leash for user authentication |
CN105099674B (en) | 2014-04-17 | 2018-09-07 | 华为技术有限公司 | User authen method, authentication device and terminal |
US9577999B1 (en) | 2014-05-02 | 2017-02-21 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US9413533B1 (en) | 2014-05-02 | 2016-08-09 | Nok Nok Labs, Inc. | System and method for authorizing a new authenticator |
US9996837B2 (en) | 2014-06-06 | 2018-06-12 | Visa International Service Association | Integration of secure protocols into a fraud detection system |
US11429700B2 (en) * | 2014-06-19 | 2022-08-30 | Nec Corporation | Authentication device, authentication system, and authentication method |
US9749131B2 (en) | 2014-07-31 | 2017-08-29 | Nok Nok Labs, Inc. | System and method for implementing a one-time-password using asymmetric cryptography |
US10148630B2 (en) | 2014-07-31 | 2018-12-04 | Nok Nok Labs, Inc. | System and method for implementing a hosted authentication service |
US9875347B2 (en) | 2014-07-31 | 2018-01-23 | Nok Nok Labs, Inc. | System and method for performing authentication using data analytics |
US9455979B2 (en) | 2014-07-31 | 2016-09-27 | Nok Nok Labs, Inc. | System and method for establishing trust using secure transmission protocols |
US9589118B2 (en) * | 2014-08-20 | 2017-03-07 | Google Technology Holdings LLC | Context-based authentication mode selection |
JP2016051240A (en) * | 2014-08-29 | 2016-04-11 | 日本光電工業株式会社 | Medical instrument system and medical instrument |
US9736154B2 (en) | 2014-09-16 | 2017-08-15 | Nok Nok Labs, Inc. | System and method for integrating an authentication service within a network architecture |
US10282089B2 (en) * | 2015-02-03 | 2019-05-07 | Google Llc | User state-adaptive text input |
US10013540B2 (en) * | 2015-03-10 | 2018-07-03 | Lenovo (Singapore) Pte. Ltd. | Authentication based on body movement |
CN110110591B (en) | 2015-06-16 | 2021-01-15 | 眼验股份有限公司 | System and method for counterfeit detection and liveness analysis |
GB2539705B (en) | 2015-06-25 | 2017-10-25 | Aimbrain Solutions Ltd | Conditional behavioural biometrics |
US10715518B2 (en) | 2015-12-08 | 2020-07-14 | Lenovo (Singapore) Pte. Ltd. | Determination of device with which to establish communication based on biometric input |
CN108885689B (en) | 2016-03-02 | 2020-06-16 | 眼验股份有限公司 | Spoofing detection using proximity sensors |
US10469653B2 (en) * | 2016-05-15 | 2019-11-05 | Fmr Llc | Proximity and movement detection of a mobile computing device during a user session |
US9686644B1 (en) | 2016-05-15 | 2017-06-20 | Fmr Llc | Geospatial-based detection of mobile computing device movement |
US9883403B2 (en) * | 2016-05-15 | 2018-01-30 | Fmr Llc | Monitoring presence of authorized user during user session based upon mobile computing device motion |
GB2552032B (en) | 2016-07-08 | 2019-05-22 | Aimbrain Solutions Ltd | Step-up authentication |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
CN106488007A (en) * | 2016-09-12 | 2017-03-08 | 努比亚技术有限公司 | A kind of auth method and terminal |
GB2554399B (en) * | 2016-09-26 | 2020-02-12 | Aimbrain Solutions Ltd | Testing the suitability of an authentication process by passive availability testing |
US10237070B2 (en) | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US10091195B2 (en) | 2016-12-31 | 2018-10-02 | Nok Nok Labs, Inc. | System and method for bootstrapping a user binding |
US10885168B2 (en) * | 2017-11-24 | 2021-01-05 | Mastercard International Incorporated | User authentication via fingerprint and heartbeat |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
EP3915389A1 (en) * | 2020-05-29 | 2021-12-01 | Ali Group S.r.l. - Carpigiani | Machine for making liquid or semi-liquid food products |
US11922731B1 (en) | 2021-06-30 | 2024-03-05 | Jumio Corporation | Liveness detection |
US11606353B2 (en) | 2021-07-22 | 2023-03-14 | Biocatch Ltd. | System, device, and method of generating and utilizing one-time passwords |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090183248A1 (en) * | 2004-10-04 | 2009-07-16 | Koninklijke Philips Electronics, N.V. | Two-way error correction for physical tokens |
US7577987B2 (en) * | 2002-12-23 | 2009-08-18 | Authernative, Inc. | Operation modes for user authentication system based on random partial pattern recognition |
US7814324B2 (en) * | 2005-02-24 | 2010-10-12 | Hewlett-Packard Development Company, L.P. | Method of making a patient monitor |
US8009121B1 (en) * | 2000-12-22 | 2011-08-30 | Ek3 Technologies, Inc. | Narrowcast media content distribution and display system with content biasing engine |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5768503A (en) * | 1995-09-25 | 1998-06-16 | International Business Machines Corporation | Middleware program with enhanced security |
US6014085A (en) * | 1997-10-27 | 2000-01-11 | Lucent Technologies Inc. | Strengthening the authentication protocol |
US7024556B1 (en) * | 2000-06-02 | 2006-04-04 | 3Com Corporation | Distributed system authentication |
US7120129B2 (en) * | 2001-03-13 | 2006-10-10 | Microsoft Corporation | System and method for achieving zero-configuration wireless computing and computing device incorporating same |
US7623970B2 (en) * | 2001-04-17 | 2009-11-24 | Panasonic Corporation | Personal authentication method and device |
DE10120364A1 (en) * | 2001-04-26 | 2002-10-31 | Philips Corp Intellectual Pty | Just-in-time authentication of domestic digital network users involves user authentication on first access to protected object with validity period dependent on access period, system use context |
US6859651B2 (en) * | 2002-03-28 | 2005-02-22 | Nokia Corporation | Method and system for re-authentication in IP multimedia core network system (IMS) |
US7644434B2 (en) * | 2002-04-25 | 2010-01-05 | Applied Identity, Inc. | Computer security system |
US7237024B2 (en) * | 2002-10-15 | 2007-06-26 | Aol Llc | Cross-site timed out authentication management |
US20050015592A1 (en) * | 2003-07-15 | 2005-01-20 | Jeou-Kai Lin | System and method for application and user-based class of security |
JP4563385B2 (en) * | 2003-07-22 | 2010-10-13 | トムソン ライセンシング | Method and apparatus for controlling credit network access based on credit |
JP4778899B2 (en) * | 2003-09-12 | 2011-09-21 | イーエムシー コーポレイション | System and method for risk-based authentication |
US7860486B2 (en) * | 2004-10-22 | 2010-12-28 | Broadcom Corporation | Key revocation in a mobile device |
US8584200B2 (en) * | 2004-10-22 | 2013-11-12 | Broadcom Corporation | Multiple time outs for applications in a mobile device |
US8027665B2 (en) * | 2004-10-22 | 2011-09-27 | Broadcom Corporation | System and method for protecting data in a synchronized environment |
JP4643657B2 (en) * | 2005-01-28 | 2011-03-02 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | User authentication and authorization in communication systems |
US8370639B2 (en) * | 2005-06-16 | 2013-02-05 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using continuous facial biometrics |
US8549651B2 (en) * | 2007-02-02 | 2013-10-01 | Facebook, Inc. | Determining a trust level in a social network environment |
US7552467B2 (en) * | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
US9014666B2 (en) * | 2006-12-15 | 2015-04-21 | Avaya Inc. | Authentication based on geo-location history |
US8788419B2 (en) * | 2006-12-30 | 2014-07-22 | First Data Corporation | Method and system for mitigating risk of fraud in internet banking |
US8457595B2 (en) * | 2007-07-20 | 2013-06-04 | Broadcom Corporation | Method and system for processing information based on detected biometric event data |
US8205092B2 (en) * | 2007-06-26 | 2012-06-19 | Novell, Inc. | Time-based method for authorizing access to resources |
US8918079B2 (en) | 2007-11-19 | 2014-12-23 | Avaya Inc. | Determining authentication challenge timing and type |
US20090198820A1 (en) * | 2007-12-07 | 2009-08-06 | Gallup, Inc. | Preserving state information client-server system networked via a stateless protocol |
-
2008
- 2008-09-30 US US12/241,584 patent/US8978117B2/en active Active
-
2015
- 2015-03-09 US US14/642,028 patent/US9262609B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8009121B1 (en) * | 2000-12-22 | 2011-08-30 | Ek3 Technologies, Inc. | Narrowcast media content distribution and display system with content biasing engine |
US7577987B2 (en) * | 2002-12-23 | 2009-08-18 | Authernative, Inc. | Operation modes for user authentication system based on random partial pattern recognition |
US20090183248A1 (en) * | 2004-10-04 | 2009-07-16 | Koninklijke Philips Electronics, N.V. | Two-way error correction for physical tokens |
US7814324B2 (en) * | 2005-02-24 | 2010-10-12 | Hewlett-Packard Development Company, L.P. | Method of making a patient monitor |
Non-Patent Citations (2)
Title |
---|
"Audio-visual multimodal fusion for biometric person authentication and liveness verification"; G Chetty et al; Proceedings of the 2005 NICTA-HCSNet Multimodal user interaction workshop 2006, 8 pages * |
"Enhancing security and privacy in biometrics-based authentication systems"; Ratha et al; IBM systems Journal, 2001; 21 pages * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180232511A1 (en) * | 2016-06-07 | 2018-08-16 | Vocalzoom Systems Ltd. | System, device, and method of voice-based user authentication utilizing a challenge |
US10635800B2 (en) * | 2016-06-07 | 2020-04-28 | Vocalzoom Systems Ltd. | System, device, and method of voice-based user authentication utilizing a challenge |
US11314896B2 (en) * | 2017-07-26 | 2022-04-26 | Forcepoint, LLC | Gracefully handling endpoint feedback when starting to monitor |
US11704437B2 (en) | 2017-07-26 | 2023-07-18 | Forcepoint Federal Holdings Llc | Gracefully handling endpoint feedback when starting to monitor |
CN108830064A (en) * | 2018-06-06 | 2018-11-16 | Oppo(重庆)智能科技有限公司 | The control method of electronic device and electronic device |
WO2022046627A1 (en) * | 2020-08-27 | 2022-03-03 | Cisco Technology, Inc. | Determining session duration for device authentication |
Also Published As
Publication number | Publication date |
---|---|
US8978117B2 (en) | 2015-03-10 |
US20090133106A1 (en) | 2009-05-21 |
US9262609B2 (en) | 2016-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9262609B2 (en) | Authentication frequency and challenge type based on environmental and physiological properties | |
US11620368B2 (en) | Digital signature using phonometry and compiled biometric data system and method | |
US10667033B2 (en) | Multifactorial unlocking function for smart wearable device and method | |
US9590985B2 (en) | Authentication frequency and challenge type based on application usage | |
US9977884B2 (en) | Authentication server for a probability-based user authentication system and method | |
US8176159B2 (en) | Habit-based authentication | |
US20150242605A1 (en) | Continuous authentication with a mobile device | |
CN107113611B (en) | User authentication confidence based on multiple devices | |
US11658967B2 (en) | Nullifying biometrics | |
US20160180068A1 (en) | Technologies for login pattern based multi-factor authentication | |
WO2016120820A2 (en) | An integrated mobile personal electronic device and a system to securely store, measure and manage user's health data | |
Hutchins et al. | Beat-pin: A user authentication mechanism for wearable devices through secret beats | |
US20160259926A1 (en) | User Authentication Based on Body Tremors | |
US20190386988A1 (en) | Biometric user's authentication | |
JP2016129629A (en) | Biological state estimation device | |
WO2017209134A1 (en) | Bioinformation measurement device, method for determining correctness of bioinformation, and program for determining correctness of bioinformation | |
TW201507695A (en) | Measuring device for electrocardiogram and measuring method for the measuring device | |
JP2017038766A (en) | Personal authentication device and personal authentication method by biological information | |
KR20220070164A (en) | Biometric Information Measuring System using Biometric Authentication | |
GB2595931A (en) | Contextualised computer-implemented security method and system | |
GB2595930A (en) | Individualised computer-implemented security method and system | |
JP2016095690A (en) | Mental care management system, and mental care management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AVAYA INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENTLEY, JON LOUIS;ERHART, GEORGE WILLIAM;SKIBA, DAVID JOSEPH;AND OTHERS;SIGNING DATES FROM 20081009 TO 20081215;REEL/FRAME:035573/0109 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS INC.;OCTEL COMMUNICATIONS CORPORATION;AND OTHERS;REEL/FRAME:041576/0001 Effective date: 20170124 |
|
AS | Assignment |
Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL COMMUNICATIONS CORPORATION), CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNI Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: VPNET TECHNOLOGIES, INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 |
|
AS | Assignment |
Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001 Effective date: 20171215 Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW Y Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001 Effective date: 20171215 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045124/0026 Effective date: 20171215 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, MINNESOTA Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA MANAGEMENT L.P.;INTELLISIST, INC.;AND OTHERS;REEL/FRAME:053955/0436 Effective date: 20200925 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT, DELAWARE Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:AVAYA INC.;INTELLISIST, INC.;AVAYA MANAGEMENT L.P.;AND OTHERS;REEL/FRAME:061087/0386 Effective date: 20220712 |
|
AS | Assignment |
Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA HOLDINGS CORP., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 |
|
AS | Assignment |
Owner name: WILMINGTON SAVINGS FUND SOCIETY, FSB (COLLATERAL AGENT), DELAWARE Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:AVAYA MANAGEMENT L.P.;AVAYA INC.;INTELLISIST, INC.;AND OTHERS;REEL/FRAME:063742/0001 Effective date: 20230501 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:AVAYA INC.;AVAYA MANAGEMENT L.P.;INTELLISIST, INC.;REEL/FRAME:063542/0662 Effective date: 20230501 |
|
AS | Assignment |
Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: CAAS TECHNOLOGIES, LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: HYPERQUALITY II, LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: HYPERQUALITY, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: ZANG, INC. (FORMER NAME OF AVAYA CLOUD INC.), NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: VPNET TECHNOLOGIES, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: OCTEL COMMUNICATIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: INTELLISIST, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023 Effective date: 20230501 Owner name: INTELLISIST, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023 Effective date: 20230501 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023 Effective date: 20230501 Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 53955/0436);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063705/0023 Effective date: 20230501 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359 Effective date: 20230501 Owner name: INTELLISIST, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359 Effective date: 20230501 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359 Effective date: 20230501 Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 61087/0386);ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT;REEL/FRAME:063690/0359 Effective date: 20230501 |
|
AS | Assignment |
Owner name: AVAYA LLC, DELAWARE Free format text: (SECURITY INTEREST) GRANTOR'S NAME CHANGE;ASSIGNOR:AVAYA INC.;REEL/FRAME:065019/0231 Effective date: 20230501 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: INTELLECTUAL PROPERTY RELEASE AND REASSIGNMENT;ASSIGNOR:WILMINGTON SAVINGS FUND SOCIETY, FSB;REEL/FRAME:066894/0227 Effective date: 20240325 Owner name: AVAYA LLC, DELAWARE Free format text: INTELLECTUAL PROPERTY RELEASE AND REASSIGNMENT;ASSIGNOR:WILMINGTON SAVINGS FUND SOCIETY, FSB;REEL/FRAME:066894/0227 Effective date: 20240325 Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: INTELLECTUAL PROPERTY RELEASE AND REASSIGNMENT;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:066894/0117 Effective date: 20240325 Owner name: AVAYA LLC, DELAWARE Free format text: INTELLECTUAL PROPERTY RELEASE AND REASSIGNMENT;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:066894/0117 Effective date: 20240325 |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
AS | Assignment |
Owner name: ARLINGTON TECHNOLOGIES, LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AVAYA LLC;REEL/FRAME:067022/0780 Effective date: 20240329 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240216 |